Cybersecurity analysts have identified that hackers are leveraging the open-source Pyramid pentesting tool to establish stealthy command-and-control (C2) communications.Originally designed as a post-exploitation framework for penetration testers, Pyramid...